Filters








3,901 Hits in 5.9 sec

Efficient verifiable encryption (and fair exchange) of digital signatures

Giuseppe Ateniese
1999 Proceedings of the 6th ACM conference on Computer and communications security - CCS '99  
Such protocols may be used to digitally sign contracts. This paper presents new simple schemes for verifiable encryption of digital signatures.  ...  In [2], versfiable eneryptionis introduced as a primitive that can be used to build extremely efficient fair exchange protocols where the items exchanged represent digital signatures.  ...  Acknowledgments We are grateful to Victor Shoup for illuminating discussions concerning the topic of this paper.  ... 
doi:10.1145/319709.319728 dblp:conf/ccs/Ateniese99 fatcat:zr4omvpqz5c4hgwiw3b5wup5xy

Fair Exchange of Digital Signatures using RSA-based CEMBS and Offline STTP [article]

Jamal A. Hussein, Mumtaz A. AlMukhtar
2009 arXiv   pre-print
While in the third one, the exchange is between confidential data and signature.  ...  One of the essential security services needed to safeguard online transactions is fair exchange.  ...  FAIR EXCHANGE PROBLEM Fair exchange of digital signatures or documents between two distrusted parties (e.g. individuals or companies) is one of the major issues in e-commerce systems.  ... 
arXiv:0912.3980v1 fatcat:yms2lod2tjbc5lqn334ubj2wxm

Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures

Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, Robert H. Deng
2011 IEEE Transactions on Information Forensics and Security  
In this paper, we fill these gaps by giving the first complete definition of accountability in OFE where one of the exchanged items is a digital signature and a generic (also the first) design of OFE where  ...  At the same time, a dishonest third party would compromise the fairness of the exchange and the third party thus must be responsible for its behaviors.  ...  Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures I.  ... 
doi:10.1109/tifs.2011.2109952 fatcat:svzp4o4euvaxhnxbjnmsxmmbzu

An Efficient Certificate-based Verifiable Encrypted Signature Scheme Without Pairings

Rufen Huang, Qiang Nong
2015 Open Cybernetics and Systemics Journal  
The verifiable encrypted signature is one of the basic fair exchange protocols. There are important applications, such as e-commerce and other cryptographic protocols.  ...  Compared with the other existing secure verifiable encrypted signature schemes, our certificate-based verifiable encrypted signature scheme provides greater efficiency and greatly reduces the cost of computation  ...  ACKNOWLEDGEMENTS The authors thank the anonymous referees and reviewers for their very valuable comments on this paper. This work is supported by Natural Science Foundation of China (No.  ... 
doi:10.2174/1874110x01408010239 fatcat:3evvfxeuh5ekbeyfwdflfbys3e

Optimistic fair exchange of digital signatures

N. Asokan, V. Shoup, M. Waidner
2000 IEEE Journal on Selected Areas in Communications  
We present a new protocol that allows two players to exchange digital signatures over the Internet in a fair way, so that either each player gets the other's signature, or neither player does.  ...  A key feature of our protocol is that a player can always force a timely and fair termination, without the cooperation of the other player.  ...  The rest of the proof goes exactly the same, mutatis mutandis, as in the case above where A was honest.  ... 
doi:10.1109/49.839935 fatcat:24qtpaqseffbrifuahpts4tovi

Optimistic fair exchange of digital signatures [chapter]

N. Asokan, Victor Shoup, Michael Waidner
1998 Lecture Notes in Computer Science  
We present a new protocol that allows two players to exchange digital signatures over the Internet in a fair way, so that either each player gets the other's signature, or neither player does.  ...  A key feature of our protocol is that a player can always force a timely and fair termination, without the cooperation of the other player.  ...  The rest of the proof goes exactly the same, mutatis mutandis, as in the case above where A was honest.  ... 
doi:10.1007/bfb0054156 fatcat:7w3psm4azjhorhvhmha67t6eha

Optimizing One Fair Document Exchange Protocol

Abdullah M. Alaraj
2012 International journal of network security and its applications  
This paper presents an efficient fair document exchange protocol. The exchange of the documents will be between two parties.  ...  This verifiable and recoverable encryption of the document's key will allow one party to verify the encrypted key.  ...  Moreover, the concept of verifiable and recoverable encryption of keys is also used. Therefore, more efficient protocol is proposed.  ... 
doi:10.5121/ijnsa.2012.4101 fatcat:kboho2tv3nfjjo76mekdmfqs2q

Verifiable encryption of digital signatures and applications

Giuseppe Ateniese
2004 ACM Transactions on Privacy and Security  
This paper presents a new simple schemes for verifiable encryption of digital signatures.  ...  Our schemes can be used as primitives to build efficient fair exchange and certified e-mail protocols.  ...  Many thanks to Victor Shoup, Jan Camenisch, and Marc Joye for their insightful comments on the conference paper on verifiable encryption [Ateniese 1999 ], and to Breno de Medeiros for his feedbacks on  ... 
doi:10.1145/984334.984335 fatcat:2xop7wavorgilfucdaslmosnz4

Ambiguous optimistic fair exchange: Definition and constructions

Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo
2015 Theoretical Computer Science  
Optimistic fair exchange (OFE) is a protocol for solving the problem of exchanging items or services in a fair manner between two parties, a signer and a verifier, with the help of an arbitrator which  ...  Abstract Optimistic fair exchange (OFE) is a protocol for solving the problem of exchanging items or services in a fair manner between two parties, a signer and a verifier, with the help of an arbitrator  ...  $ A preliminary version of this paper appeared in Asiacrypt 2008 [25] . This is a vastly extended version. This work is supported by the National Natural  ... 
doi:10.1016/j.tcs.2014.09.043 fatcat:gbbutkwh3vg6dhcziyzwk6evjm

Breaking and repairing optimistic fair exchange from PODC 2003

Yevgeniy Dodis, Leonid Reyzin
2003 Proceedings of the 2003 ACM workshop on Digital rights management - DRM '03  
Verifiably committed signatures generalize (non-interactive) verifiably encrypted signatures [8] and two-signatures, both of which are sufficient for fair exchange.  ...  By utilizing the stateof-the-art non-interactive two-signature of Boldyreva [6], we obtain an efficient and provably secure (in the random oracle model) fair exchange protocol, which is based on GDH signatures  ...  Acknowledgments We thank Alexandra Boldyreva, Jung Min Park, and Victor Shoup for useful discussions concerning fair exchange and comments on this paper.  ... 
doi:10.1145/947380.947387 dblp:conf/drm/DodisR03 fatcat:axl32ep3abavdgwqb6hpxe7u5i

Breaking and repairing optimistic fair exchange from PODC 2003

Yevgeniy Dodis, Leonid Reyzin
2003 Proceedings of the 2003 ACM workshop on Digital rights management - DRM '03  
Verifiably committed signatures generalize (non-interactive) verifiably encrypted signatures [8] and two-signatures, both of which are sufficient for fair exchange.  ...  By utilizing the stateof-the-art non-interactive two-signature of Boldyreva [6], we obtain an efficient and provably secure (in the random oracle model) fair exchange protocol, which is based on GDH signatures  ...  Acknowledgments We thank Alexandra Boldyreva, Jung Min Park, and Victor Shoup for useful discussions concerning fair exchange and comments on this paper.  ... 
doi:10.1145/947386.947387 fatcat:rfx66lsy5jawjaroa2nc3zklza

Fair and Decentralized Exchange of Digital Goods [article]

Ariel Futoransky, Carlos Sarraute, Daniel Fernandez, Matias Travizano, Ariel Waissbein
2020 arXiv   pre-print
We introduce a protocol for the data-token exchange where neither party gains more information than what it is paying for, and the exchange is fair: either both parties gets the other's item or neither  ...  In this market, buyers and sellers make transactions in a blockchain and interact with a third party, called notary, who has the ability to vouch for the authenticity and integrity of the data.  ...  In a fair exchange, two parties wish to exchange a piece of data each holds and is secret to the other.  ... 
arXiv:2002.09689v1 fatcat:jt5jecvuxreqfiq5v2pamg65ua

Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology [chapter]

Stephen R. Tate, Roopa Vishwanathan
2009 Lecture Notes in Computer Science  
One of the more important applications of verifiable encryption is the fair exchange problem: Two par-  ...  Verifiable encryption has been used to construct solutions for fair exchange [1, 2], escrow schemes [35] , signature sharing schemes [19] and publicly verifiable secret sharing [40] .  ...  In the process we have provided an efficient protocol for verifiable group encryption and improved the efficiency of the protocol for fair exchange of signatures due to Asokan et al. [1].  ... 
doi:10.1007/978-3-642-03007-9_17 fatcat:vmjrdwkm7rezrkijibs53th6xq

Fair signature exchange via delegation on ubiquitous networks

Q. Shi, N. Zhang, M. Merabti
2015 Journal of computer and system sciences (Print)  
The proposed work includes a novel approach to symmetric-key based verifiable proxy encryption to make the exchange delegation flexible, efficient and simple to implement on resource-limited devices commonly  ...  This paper addresses the issue of autonomous fair signature exchange in emerging ubiquitous (u-) commerce systems, which require that the exchange task be delegated to authorised devices for its autonomous  ...  Fair Signature Exchange Protocol Based on the verifiable proxy encryption approach proposed in Section 4, we now present a protocol for Proxy-Led Efficient Autonomous Signature Exchange (PLEASE) in u-commerce  ... 
doi:10.1016/j.jcss.2014.11.001 fatcat:bdqtfbyawzen3m7jad4s26a5ji

Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems

Jun Wang, Feixiang Luo, Zequan Zhou, Xiling Luo, Zhen Wang
2019 Security and Communication Networks  
Fortunately, with the assistance of cloud computing and big data, optimistic fair exchange of digital items in cyber-physical systems (CPSes) can be efficiently managed.  ...  To solve the above problems, we use a new technique called verifiably encrypted identity-based signature (VEIS) to construct optimistic fair exchange in cloud-assisted CPSes.  ...  Acknowledgments is work was supported by the National Natural Science Foundation of China (No. U17733115).  ... 
doi:10.1155/2019/5175076 fatcat:wydud2me25afjb67g5r6fzsnga
« Previous Showing results 1 — 15 out of 3,901 results